-
Notifications
You must be signed in to change notification settings - Fork 14
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
New Known ipmitool Security Vulnerabilities #37
Comments
Hello, Any updates on this or ETA for when ipmitool-xcat might get updated to fix the security vulnerabilities? There doesn't seem to be any ETA or plans for a new upstream 1.8.19 release any time soon, so it might be a good idea if these vulnerabilities could be fixed in ipmitool-xcat (backporting the commit fixes from upstream) even before the official upstream release comes out (rather than waiting on an upstream release that may never actually come). Thank you. |
working on two possible way to update:
|
IMHO, I think the 2nd method is the way to go and if you choose that path, the tar file should reflect the git commit ID at the checkout point, so that we know it's not the 1.8.18 release version. For example: |
yes, for the 2nd method,
will have to check each patch and re-build if necessary. |
I think you should focus on the patches that were done for 1.8.18... (rflash/saneretry/signal) one way to check if anything changed in that path... just extract the 1.8.18 tar to a working area, extract the new tar... then diff the original files that we are making patches to, if they match, then most likely we can just apply the patch.. or make one with similar changes. I'm not sure how we would go about testing this, i think we would just need to deploy the new package, install it and run flash/console and other things that exercise that path. |
they are three and half years apart between release tar and the new tar, most files are changed. The older patches are no longer works for new tar |
created few new patches based on the new tar since commit Because above issue, I used first approach, modified diff results for
|
Note: make sure
|
it's in the current dev build and will be in the 2.16 xCAT release. |
Hello,
Upstream ipmitool recently released a security advisory for "Multiple potential remote code execution vulnerabilities" that were recently found and fixed in ipmitool: GHSA-g659-9qxw-p7cp
It seems like these are supposed to be fixed in version 1.8.19 but that hasn't been released yet and there doesn't appear to be any ETA on when that might come out. The fixes are available in their master branch though. Red Hat has the list of commits that fix the vulnerabilities listed here: https://bugzilla.redhat.com/show_bug.cgi?id=1798721#c2. The latest ipmitool-xcat appears to be based on ipmitool 1.8.18.
Given the extensive use of ipmitool by xCAT (through ipmitool-xcat) and the fact that it is likely always run as the privileged root user, I think it would be preferred for xCAT to get this fixed in ipmitool-xcat sooner rather than later (potentially even before an official upstream release of ipmitool). Yes, I understand you would need to connect to untrusted IPMI-enabled devices, but it wouldn't be out-of-the-question to have a compromised IPMI-enabled device being used. Still would be good to get fixed ASAP regardless.
Can ipmitool-xcat please be updated to fix these vulnerabilities in ipmitool?
Thank you.
The text was updated successfully, but these errors were encountered: